Military Technology

Cost growth in the development and fielding of technologically advanced weapon systems has become a major economic burden for many nations and is expected to be an enduring and prevalent problem. RAND research has provided cost analyses and recommendations to help policymakers and military leaders develop improved cost-estimating tools and formulate policies that mitigate cost growth in military technology acquisition practices.

  • Line handlers await the arrival of the Virginia class attack submarine USS Hartford

    Blog

    How Do We Deal with a Flood of Data?

    Despite the battle-tested value of intelligence, surveillance, and reconnaissance (ISR) systems, the amount of data they generate has become overwhelming to Navy analysts. If the Navy does not change the way it processes information, it will reach an ISR “tipping point”—as soon as 2016.

    Jun 23, 2014

  • Customs and Border Protection officer Ballard inspects a motorist's passport at the San Ysidro border crossing between Mexico and the U.S. in San Ysidro, California

    Blog

    Saving Money by Using Advanced DoD Sensors on the U.S. Border

    There is no legal reason why a DoD sensor should be excluded from use in an interagency technology demonstration or in an actual counterdrug operation as long as a valid request for support is made by an appropriate law enforcement official and no personally identifiable or private information on U.S. citizens is collected.

    Jun 6, 2014

  • t-call-experts-hr

    Multimedia

    Media Call on Armed Aerial Drones and U.S. Security

    Lynn Davis, Director of RAND's Washington office and senior political scientist, hosted a news media conference call to discuss armed aerial drones and U.S. security. Davis discussed issues such as how dangerous proliferation of drones may be, whether drones are transformative weapons, and how the U.S. can help shape a set of international norms that could discourage misuse by others.

    May 16, 2014

  • Report

    The Effectiveness of Remotely Piloted Aircraft in a Permissive Hunter-Killer Scenario

    This report analyzes the operational effectiveness of several new concepts for employing remotely piloted aircraft in a permissive hunter-killer mission.

    May 9, 2014

  • scientific illustration designed at RAND for Haskins Lecture

    Event

    Haskins Lecture – Next: Breakthrough Technologies for National Security

    The 2014 Haskins Lectureship on Science Policy will feature Arati Prabhakar, director of the Defense Advanced Research Projects Agency, discussing breakthrough technologies for national security.

    May 8, 2014

  • News Release

    'Cloud' System Could Help Navy Analysts Consume Expanding Ocean of Data

    The Navy has a growing demand for intelligence to help Navy vessels avoid collisions, pinpoint targets, and perform other vital tasks. But the amount of data it may collect in the future is more than it can process today. Cloud strategies offer promising options.

    May 5, 2014

  • intelligence specialist monitors automatic identification systems aboard the aircraft carrier USS George H.W. Bush

    Report

    'Cloud' System Could Help Navy Analysts Consume Expanding Ocean of Data

    The Navy has a growing demand for intelligence to help Navy vessels avoid collisions, pinpoint targets, and perform other vital tasks. But the amount of data it may collect in the future is more than it can process today. “Cloud” strategies offer promising options.

    May 1, 2014

  • Report

    Prolonged Cycle Times and Schedule Growth in Defense Acquisition: A Literature Review

    This report summarizes a selection of the defense acquisition literature from the 1960s to the present on potential sources of prolonged acquisition cycle times and schedule growth, as well as potential opportunities for improvement.

    Apr 30, 2014

  • Report

    RAND Arroyo Center Annual Report 2013

    Describes RAND Arroyo Center's research activities in FY13 and summarizes noteworthy studies performed throughout the year.

    Apr 23, 2014

  • A U.S. Air Force MQ-1 Predator on its final approach to Indian Springs Auxiliary Field in Nevada

    Report

    Armed Aerial Drones and U.S. Security

    While armed drones are not truly transformative weapons, they do offer the United States some significant advantages, particularly against enemies that lack air defenses. How the United States uses these weapons today and into the future will be important in shaping a broader set of international norms that discourage their misuse by others.

    Apr 7, 2014

  • Report

    Lessons Learned from the Afghan Mission Network: Developing a Coalition Contingency Network

    Reviews and assesses the operational and technical history of the Afghan Mission Network, the primary network for the International Security Assistance Force in Afghanistan, and identifies lessons learned for future coalition networks.

    Mar 28, 2014

  • Report

    Rapid Acquisition of Army Command and Control Systems

    For the last decade, the U.S. Army has quickly acquired systems for war. By examining the nontraditional methods used, this study examines how the Army can improve rapid acquisition, focusing in particular on command and control systems.

    Mar 28, 2014

  • Report

    Venture Capital and Strategic Investment for Developing Government Mission Capabilities

    Through case studies and economic modeling, this research on government strategic investment will help acquisition managers evaluate strategic investment methods to motivate mission-oriented innovation by private firms.

    Mar 24, 2014

  • Report

    Soldier-Portable Battery Supply: Foreign Dependence and Policy Options

    This report describes government and industry concerns associated with the foreign-dependent supply chain for batteries used by soldiers. It discusses alternative policy options to address these concerns.

    Mar 21, 2014

  • U.S. Border Patrol agents patrol along the international border between Mexico and the United States near San Diego, California, photo by Reuters/Mike Blake

    Report

    Improving Interagency Information Sharing Using Technology Demonstrations

    New and innovative intelligence, surveillance, and reconnaissance technologies developed by the U.S. Department of Defense for the military could also be used by the Department of Homeland Security and the Drug Enforcement Administration to help secure the southern U.S. border.

    Mar 18, 2014

  • Deploying soldiers test new female body armor prototype

    Solution

    Lightening Body Armor

    Soldiers serving in Afghanistan regularly marched carrying more than 100 pounds of arms and equipment. Approximately one third of that burden is body armor. How can the weight of body armor be reduced without risking the lives of the soldiers it protects?

    Jan 1, 2014

  • Haleakala Observatory — AEOS 3.67-meter telescope is the largest in the Department of Defense.

    Report

    A Sixty-Year Timeline of the Air Force Maui Optical and Supercomputing Site

    Since it was built in the 1950s, the Air Force Maui Optical and Supercomputing Site's mission, management structure, and operational partners have changed several times to accommodate the contemporary challenges and research tools. This timeline documents some of those historical changes.

    Dec 16, 2013

  • a binary illustration

    Research Brief

    Future Technology Landscapes: Insights, Analysis, and Implications for Defense

    Given the growing volume of primarily civil technology that can both impact and be leveraged by defense and security capabilities, the UK Ministry of Defense sought insights into relevant future technology and innovation models.

    Dec 5, 2013

  • digital globe

    Report

    Case Studies Explore Future Technology Landscapes

    Case studies explore a growing volume of primarily civil technology that can both potentially impact and be exploited as UK defense and security capabilities.

    Dec 5, 2013

  • binary face future technology landscape

    Report

    Implications of Future Technology Landscapes for Defense

    To help the UK Ministry of Defence (MOD) assess and harness wider investment in relevant technology areas, researchers examine a growing volume of primarily civil technology that can both potentially impact and be exploited as defense and security capabilities.

    Dec 5, 2013